ASA), NAC, IPS/IDS, and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred (e.g., CISSP, CCNP Security, CCIE … is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically More ❯
be proficient in automation and orchestration tools (eg, SOAR platforms, Scripting languages like Python, PowerShell) and have experience with integrating security tools (eg, SIEM, EDR, Firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: . Build security automations, logging, and SIEM detections to improve the CDO's efficiency, scalability, and incident response capabilities. . Design, implement, and maintain … automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. . Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. . Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive More ❯
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You'll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
objectives. Performance Monitoring : Continuously monitor, analyse, and enhance the reliability of large-scale distributed systems to ensure seamless uptime and operational efficiency. Automation Solutions : Develop automation solutions for configuration management, system provisioning, and deployment, significantly streamlining operations and minimising manual processes. Security Compliance : Implement and maintain robust security protocols, ensuring that systems comply with regulatory standards and best practises … including data encryption, access control, and vulnerability management. Incident Management : Lead efforts in resolving system outages or performance degradation, conduct root cause analysis, and implement preventive measures to mitigate future risks. Collaboration : Work closely with cross-functional teams, including software development, DevOps, and IT operations, to integrate solutions, troubleshoot issues, and enhance overall system performance. Capacity Planning : analyse More ❯
of the organisation's technology infrastructure, interfacing closely with the business to understand and support their needs, you'll drive efficiencies and assist in the design and life cycle management of the infrastructure across the organisation encompassing physical, virtual and with a continued focus on cloud platforms and associated stack technologies. About you You'll have strong technical knowledge … Server/Client OSes, Exchange Hybrid, M365, Intune) Microsoft Security stack tools(Defender, Security and Compliance, Purview) Virtualisation Technologies (VMWare) Networking Technologies (LAN/WLAN, WAN/MPLS) Storage Management (physical SAN and software-defined) Monitoring and management tools (PRTG, SCCM, intune) Backup, restore and business recovery processes Security Technologies (Firewalls/VPN/Malware Protection/Email … Web Filtering) With practical experience of securing and hardening above platforms and use of vulnerabilitymanagement systems, you'll also have exposure to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools. You'll have significant experience of implementing and supporting Infrastructure technology solutions, as well as practical experience of Security More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Matchtech
concept to maintenance-ensuring alignment with customer and regulatory requirements. Key Responsibilities: Lead the definition, implementation, and governance of product security measures across the entire system lifecycle. Develop Security Management Plans, risk assessments, and mitigation strategies. Define and review security requirements for product teams. Support system accreditation, liaising with security accreditors and assurance teams. Prepare security documentation including Protection … Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetration testing, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or related field. Certified security professional (e.g. CISSP, NCSC Certified Professional). Familiar with UK/NATO IA standards (ISO More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerabilitymanagement tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
South Croydon, London, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
working collaboratively with senior Security colleagues across the organisation on a day-to-day basis. Working within Security Testing, you will play a leading role in delivering security testing, vulnerability assessment and continual security compliance capabilities in order to secure services and to ensure the best possible technical security risk-based advice is given to our customers. You will … Work with the growing security testing team to scope, conduct, or support security assessments, pen testing and other non-functional security testing, appropriately recording and sharing any findings. Provide Vulnerabilitymanagement and continual security compliance expertise across on premise and cloud-based solutions. Work collaboratively with project managers and programme leads to provide subject matter expertise on a … determine deviations from acceptable/defined baselines. Communicate threat, vulnerabilities, and risk information to stakeholders in a clear and concise manner. Research and assess new threats and security/vulnerability alerts, and recommend remedial actions. Essential Criteria Proven understanding and experience of how technical security is applied in real life environments, technical security controls, threats and vulnerabilities (incl. threat More ❯
Practice Leads and technical specialists. This role requires true Operational Technology Consulting experience and exposure to/hands-on experience with Cisco Cyber Vision. Role Requirements * Conduct cybersecurity and vulnerability criticality assessments of OT systems, categorising risks and recommending appropriate mitigation measures based on assessment findings. * Benchmarking cybersecurity posture of OT environments against industry standards (e.g. ISA/IEC … SP 800-82, ONG-C2M2, and NERC-CIP. * Technical Experience with: · Cisco CyberVision or Claroty · Security Orchestration, Automation, and Response (SOAR) platforms · OT asset inventory and change detection tools · Vulnerabilitymanagement solutions · OT network and communications monitoring tools · Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more information or immediate consideration for this opportunity, please contact More ❯
Southampton, Hampshire, South East, United Kingdom
Pearson Whiffin IT & Digital
min requirement We are looking for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a Cisco environment. The project is … the office. Required Skills and Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerabilitymanagement with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge of network security with a More ❯
and vCente Managing and troubleshooting Linux servers (RHEL, CentOS, Ubuntu), including installation, configuration, and performance tuning. Implementing security best practices for Linux and VMware environments, including system hardening and vulnerability management. Using scripting languages like Python or Bash to automate tasks, manage infrastructure, and optimize performance Working with cross-functional teams to integrate Linux and VMware solutions within the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
ECS
Remote Working £450 - £500, Inside IR35 We are seeking a hands-on Linux Engineer to work for a True Household Name where you will be supporting server patching and vulnerabilitymanagement initiative. As a Linux Engineer, you will be responsible for: Perform patching on Red Hat Enterprise Linux servers Support and track vulnerability remediation and compliance activities … working as a Linux Engineer Red Hat Linux Certified (highly desirable) Solid hands-on experience with Red Hat Enterprise Linux (RHEL 7/8/9) Familiarity with patch management tools (e.g., yum, dnf, Red Hat Satellite) Please note, due to internal capabilities it will be difficult for us to take internal calls regarding your application - please direct all More ❯